1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
2 years ago
14

a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​

Computers and Technology
1 answer:
Svetllana [295]2 years ago
7 0

Answer:

do 15% on a calculator then divide by 9

Explanation:

You might be interested in
__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
vitfil [10]

Answer:

Cryptography

is the correct answer.

Explanation:

<h2><u>Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />

Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:

  • Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
  • Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
  • Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
  • Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.

<h3>I hope it will help you!</h3>
5 0
3 years ago
Does anyone know this page for drivers ed?
Yuki888 [10]

1. Correct

2. Brake

3. Traffic

4. Pedestrians

5. Crosswalk

6. Left

7. Front

8. Center

9.Nearest

10.Accelerate

5 0
3 years ago
Vghfthcnbvhghvngjgjvjgkb, kcnjc cnnfjdhd mc Dan Jfhjc cm. Cm n n hdjfjocnkcnd
seropon [69]

Is this supposed to be a question?

6 0
3 years ago
Read 2 more answers
A popular use of cd-rw and cd-r discs is to create audio cds. what is the process of copying audio and/or video data from a purc
Savatey [412]
<span>This process is called ripping. Ripping occurs when the audio or video content of a disc is extracted and copied onto any other digital media. This process does not damage the original disc or the data it contains. This process requires specific software to be successful.</span>
4 0
3 years ago
1) You are working with an organization as a network manager. The organization has
pantera1 [17]

Answer:

Explanation:

a. In this specific scenario, the best option would most likely be a site-to-site VPN. This would allow each office to be independently connected to the internet and at the same time be connected to each other securely and efficiently. There should be unnoticeable or no delay at all between the two offices and sensitive files will be completely secure. Therefore, the two offices can easily transfer data securely between one another without fear of the data being intercepted.

b.  The same VPN network would work on the head office, but instead we can implement firewall restrictions to the head office network itself. These restrictions would prevent any or all incoming connections that are trying to request data from the local head office network. This would allow the head office to continue working without worry of unwanted intruders in their network.

7 0
3 years ago
Other questions:
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • Martha wants to invite her coworkers to her birthday party. She uses the mail merge feature to compose and send the invitations.
    6·1 answer
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • 15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) I
    11·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • How does a modem work​
    13·1 answer
  • List and briefly define the four main elements of a computer.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!